2. I always prefer to avoid main domain & focus on subdomain instead. Main domain is targeted by hundreds already, So go deeper, if you go deeper its more dark there & you will see its less crowded.
5. Use your word list to find hidden subdomains, I found 10s of more subdomains using WL created using the common words used in the source.
3/n
6. Code Review: This should your approach for everything. The JavaScript or a simple source-code review will make you understand how the application works. This will as well help you to find more and more hidden parameters.
7. Use SQLMAP and Ghauri by @r0oth3x49 extensively. In a lot of cases I found Ghauri was faster than SQLMAP with less false-positives. Make sure to try different techniques, bypass scripts. Do not forget to watch @GodfatherOrwa methodology here: youtube.com/playlist?list=…
5/n
Read this list, there are lot of HackerOne reports listed specially SQL injection related. Read 2-3 articles per day and understand the methodology used by others and create your own based on it.
And lastly, make your own methodology. My methodology works works for me, it may not work for you. I spent months reading, trying different ways and failing multiple times b4 getting here, so don't expect the results next day. Practice and make yourself perfect.
Goodluck.
7/n
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Find an easy #XSS that found all-over the internet.
Dork: inurl:"/irj/portal/" > visit the target, remove "/irj/portal/" from the url & add the payload in 2nd tweet. There are thousands of huge orgs with this #XSS, I reported > 150. Thank me later.#BugBountyTips#infosec